{"version":"1.0","provider_name":"Internet Society","provider_url":"https:\/\/www.internetsociety.org\/fr\/","author_name":"Steve Olshansky","author_url":"https:\/\/www.internetsociety.org\/fr\/author\/olshansky\/","title":"Blockchain et l'identit\u00e9 num\u00e9rique - une bonne combinaison ? - Internet Society","type":"rich","width":600,"height":338,"html":"<blockquote class=\"wp-embedded-content\" data-secret=\"zsxvDIUGKi\"><a href=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/blockchain-digital-identity-good-fit\/\">Blockchain et l&rsquo;identit\u00e9 num\u00e9rique &#8211; une bonne combinaison ?<\/a><\/blockquote><iframe sandbox=\"allow-scripts\" security=\"restricted\" src=\"https:\/\/www.internetsociety.org\/fr\/blog\/2018\/03\/blockchain-digital-identity-good-fit\/embed\/#?secret=zsxvDIUGKi\" width=\"600\" height=\"338\" title=\"\u00ab\u00a0Blockchain et l&rsquo;identit\u00e9 num\u00e9rique &#8211; une bonne combinaison ?\u00a0\u00bb &#8212; Internet Society\" data-secret=\"zsxvDIUGKi\" frameborder=\"0\" marginwidth=\"0\" marginheight=\"0\" scrolling=\"no\" class=\"wp-embedded-content\"><\/iframe><script>\n\/*! This file is auto-generated *\/\n!function(d,l){\"use strict\";l.querySelector&&d.addEventListener&&\"undefined\"!=typeof URL&&(d.wp=d.wp||{},d.wp.receiveEmbedMessage||(d.wp.receiveEmbedMessage=function(e){var t=e.data;if((t||t.secret||t.message||t.value)&&!\/[^a-zA-Z0-9]\/.test(t.secret)){for(var s,r,n,a=l.querySelectorAll('iframe[data-secret=\"'+t.secret+'\"]'),o=l.querySelectorAll('blockquote[data-secret=\"'+t.secret+'\"]'),c=new RegExp(\"^https?:$\",\"i\"),i=0;i<o.length;i++)o[i].style.display=\"none\";for(i=0;i<a.length;i++)s=a[i],e.source===s.contentWindow&&(s.removeAttribute(\"style\"),\"height\"===t.message?(1e3<(r=parseInt(t.value,10))?r=1e3:~~r<200&&(r=200),s.height=r):\"link\"===t.message&&(r=new URL(s.getAttribute(\"src\")),n=new URL(t.value),c.test(n.protocol))&&n.host===r.host&&l.activeElement===s&&(d.top.location.href=t.value))}},d.addEventListener(\"message\",d.wp.receiveEmbedMessage,!1),l.addEventListener(\"DOMContentLoaded\",function(){for(var e,t,s=l.querySelectorAll(\"iframe.wp-embedded-content\"),r=0;r<s.length;r++)(t=(e=s[r]).getAttribute(\"data-secret\"))||(t=Math.random().toString(36).substring(2,12),e.src+=\"#?secret=\"+t,e.setAttribute(\"data-secret\",t)),e.contentWindow.postMessage({message:\"ready\",secret:t},\"*\")},!1)))}(window,document);\n\/\/# sourceURL=https:\/\/www.internetsociety.org\/wp-includes\/js\/wp-embed.min.js\n<\/script>\n","thumbnail_url":"https:\/\/www.internetsociety.org\/wp-content\/uploads\/2018\/03\/blockchain-identity.jpg","thumbnail_width":1280,"thumbnail_height":550,"description":"Chaque fois que vous voyez \u00ab\u00a0Se connecter avec Facebook\u00a0\u00bb ou \u00ab\u00a0Se connecter avec Twitter\u00a0\u00bb etc. sur un site Web ou vous utilisez les informations de connexion \u00e9mises par votre employeur ou \u00e9cole, vous utilisez les technologies IAM (Identity and Access Management). IAM est devenu central \u00e0 nos interactions en ligne, mais comme beaucoup d&rsquo;infrastructures, il [&hellip;]"}